basic-auth-connect is Connect's Basic Auth middleware in its own module. basic-auth-connect < 1.1.0 uses a timing-unsafe equality comparison that can leak timing information. This issue has been fixed in basic-auth-connect 1.1.0.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Oct 2024 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 30 Sep 2024 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 30 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | basic-auth-connect is Connect's Basic Auth middleware in its own module. basic-auth-connect < 1.1.0 uses a timing-unsafe equality comparison that can leak timing information. This issue has been fixed in basic-auth-connect 1.1.0. | |
Title | basic-auth-connect's callback uses time unsafe string comparison | |
Weaknesses | CWE-208 | |
References |
| |
Metrics |
cvssV4_0
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-09-30T15:09:59.513Z
Updated: 2024-09-30T16:01:32.189Z
Reserved: 2024-09-19T22:32:11.962Z
Link: CVE-2024-47178
Vulnrichment
Updated: 2024-09-30T16:01:27.334Z
NVD
Status : Awaiting Analysis
Published: 2024-09-30T16:15:09.410
Modified: 2024-10-04T13:51:25.567
Link: CVE-2024-47178
Redhat